Best of LinuxJune 2024

  1. 1
    Article
    Avatar of dhhDavid Heinemeier Hansson·2y

    Introducing Omakub

    Omakub is an opinionated web developer setup for Ubuntu that turns a fresh installation into a fully-configured, beautiful, and modern web development system. It includes curated applications and tools and focuses on providing a cohesive package of goods for developers new to Linux.

  2. 2
    Article
    Avatar of faunFaun·2y

    Essential Linux Terminal Hacks for efficiency — Part 2

    Learn essential Linux terminal hacks for efficiency, including reverse cmd search, reusing commands from history, displaying date and time in history, running multiple commands at once, viewing content with 'less', using 'column' to format text output, truncating files, viewing head and tail of files, checking exit codes, creating nested directories, and using the 'file' command.

  3. 3
    Article
    Avatar of communityCommunity Picks·2y

    Half-Life Dedicated Server With Docker

    This post provides a guide on setting up a Half-Life Dedicated Server using Docker. It outlines the steps of creating a Dockerfile, installing SteamCMD, configuring the server, and adding custom plugins and maps. The guide emphasizes the use of Docker containers for consistency and portability, explains the role of `hlds.txt` in SteamCMD setup, and details the use of volume mapping for incorporating custom configurations and mods. The project also includes high-level goals for supporting various Valve games and custom mods.

  4. 4
    Video
    Avatar of bigboxswebigboxSWE·2y

    Legendary Programmers

    Legendary programmers who made significant contributions to the programming and software engineering world, including Lonus Tals, Richard Stallman, John Karmac, Fabr Bard, Dennis Richie, Ken Thompson, Kathleen Booth, and Terry Davis.

  5. 5
    Article
    Avatar of itnextITNEXT·2y

    6 Essential Linux Command Line Tools for DevOps Engineers

    DevOps engineers rely heavily on various command line tools to manage deployments, automate tasks, and troubleshoot issues effectively. This guide highlights six essential Linux command-line tools every DevOps engineer should master: yq for parsing and modifying YAML files, sed and grep for updating configurations, curl for checking deployment statuses, tee for logging deployment steps, watch for real-time monitoring, and journalctl for viewing system logs. Mastery of these tools can significantly boost productivity and efficiency in handling complex DevOps tasks.

  6. 6
    Article
    Avatar of omgubomg! ubuntu!·2y

    Linux System Monitor App ‘Mission Center’ is Now Even More Useful

    A new version of Mission Center, a system monitor for Linux, has been released. It includes new features such as a Services page, smoother graphs, and support for hot-plugging disks and network devices.

  7. 7
    Article
    Avatar of gcgitconnected·2y

    Learning Rust: Bare Threading

    This post explores threading and concurrency in Rust, focusing on the use of raw pipes in Linux to schedule work on a CPU and transfer closures between threads. The author provides examples of code that demonstrate how to create concurrency and use pipes, as well as an explanation of the sys_pipe2 system call.

  8. 8
    Article
    Avatar of communityCommunity Picks·2y

    What are the Different Types of Shells in Linux?

    Shells act as an interface between users and the kernel, allowing command execution and system interaction. Key Linux shells include the Bourne shell (sh), Bash (GNU Bourne-Again shell), C shell (csh), Korn shell (ksh), and Z Shell (zsh). Each shell has unique features suitable for specific tasks, such as Bourne's compact nature, Bash’s command recall, C shell’s aliasing, Korn shell’s script compatibility, and Zsh's customization.

  9. 9
    Article
    Avatar of itsfossIt's Foss·2y

    Using LM Studio to Run LLMs Easily, Locally and Privately

    LM Studio allows you to run Large Language Models (LLMs) directly on your computer, ensuring privacy and control over your data. The user-friendly interface simplifies downloading and using models, such as LLaMA 2, without lengthy terminal commands. Ideal for users with powerful systems, the application provides an alternative to cloud-based AI solutions by leveraging local hardware for AI tasks.

  10. 10
    Article
    Avatar of itsfossIt's Foss·2y

    Top 5 AI Browsers for Linux

    This post lists the top 5 AI browsers for Linux, highlighting their AI-powered features and benefits. It includes Brave Browser with its assistant Leo, Opera One with its integrated AI Aria, Microsoft Edge with Copilot, Wavebox with Brainbox and ResembleAI, and Pinokio Browser with its customizable scripts.

  11. 11
    Article
    Avatar of dhhDavid Heinemeier Hansson·2y

    Visions of the future

    Discovering the future early and undistributed is an exciting feeling. The author has felt this way about various things in the past like Linux, Mac, and Ruby. They believe in taking risks and being early on ideas.

  12. 12
    Article
    Avatar of itnextITNEXT·2y

    Networking and Sockets: Syn and Accept queue

    The post delves into the intricacies of TCP connection management, focusing on the SYN and accept queues during the listen syscall. It explains how these queues handle incoming connections, the implications of their size limits, and how different operating systems manage these settings. Practical examples in Rust are provided to demonstrate how to configure and test the backlog parameters, and system-level commands are used to inspect queue behaviors. Understanding these concepts is essential for optimizing server performance and handling high traffic scenarios.

  13. 13
    Article
    Avatar of communityCommunity Picks·2y

    Chmod Calculator

    An awesome Chmod Calculator to convert Linux file permissions between different formats.

  14. 14
    Article
    Avatar of omgubomg! ubuntu!·2y

    Proton Pass for Linux Released (Encrypted Password Manager)

    Proton Pass for Linux and macOS has been released, expanding Proton's support for major desktop operating systems. The new app integrates with the system's authentication mechanisms and APIs, allowing for unlocking with a Linux user account, fingerprint reader, or Linux PAM-supported module. Proton Pass is an encrypted password manager with a built-in 2-factor authentication system, support for passkeys, password sharing, and email masking. It can import passwords from other managers like Bitwarden, 1Password, and KeePass. There is a free version with some limitations and a paid plan that unlocks additional features and access to Proton Monitor, which scans for data leaks on the 'dark web'.

  15. 15
    Article
    Avatar of lobstersLobsters·2y

    basecamp/omakub: Opinionated Ubuntu Setup

    Omakub is an opinionated Ubuntu setup that provides a fully-configured web development system. It includes curated tools and applications for a ready-made system without the need for manual configuration. Users can install Omakub by running a single command.

  16. 16
    Video
    Avatar of primeagenThePrimeTime·2y

    You're A Furry If You Use This Linux Distro

    This post discusses different Linux distributions, including their advantages, drawbacks, and user preferences. It also mentions the association of certain distros with specific subcultures. Overall, it provides insights into the diverse world of Linux distros.

  17. 17
    Article
    Avatar of lobstersLobsters·2y

    ioi/isolate: Sandbox for securely executing untrusted programs

    Isolate is a sandbox for securely executing untrusted programs, preventing them from affecting the host system. It was developed by Martin Mareš and Bernard Blackham, and is now maintained on GitHub. Bug reports and feature requests can be submitted there.

  18. 18
    Article
    Avatar of omgubomg! ubuntu!·2y

    Ubuntu is Finally Adding DEB Installer Support to App Center

    Ubuntu's App Center is adding support for DEB installers downloaded from the web, allowing users to install software via a guided GUI process. However, this raises security concerns as DEBs are not vetted and can contain malicious content.

  19. 19
    Video
    Avatar of bigboxswebigboxSWE·2y

    Toxic Programming Fans

    The post criticizes the toxic culture among fanboys of various programming tools, including TypeScript, Rust, and Neovim. It highlights the disruptive behavior of avid supporters who often undermine the benefits of multiple tools by being overly dogmatic. The writer expresses frustration with these communities and promotes brilliant.org as a helpful learning platform.

  20. 20
    Article
    Avatar of ebpfeBPF·2y

    Monitoring PostgreSQL Database on Kubernetes using eBPF

    Learn how to monitor PostgreSQL databases on Kubernetes using eBPF. The post covers the theoretical background and includes a practical example demonstrating how to track client queries to identify potential database bottlenecks. The monitoring system employs an eBPF agent to observe and analyze protocol message formats without requiring modifications to the application code. It concludes with a performance evaluation highlighting the impact on latency and CPU load.

  21. 21
    Article
    Avatar of devtoDEV·2y

    Comparing SQL engines by CPU instructions for DML

    This post compares the CPU usage of different SQL engines, such as PostgreSQL, Oracle, SQL Server, MySQL, TiDB, YugabyteDB, and CockroachDB, for simple DML operations. The results show that despite their different implementations, PostgreSQL, Oracle, and SQL Server perform well in terms of CPU usage. TiDB, YugabyteDB, and CockroachDB exhibit higher CPU utilization due to their distributed and scalable architectures. Overall, the performance varies depending on the database engine and workload.

  22. 22
    Article
    Avatar of glwGolang Weekly·2y

    Golang Weekly Issue 510: June 11, 2024

    Learn about using eBPF to monitor system calls and incoming IP packets. Build and deploy scalable applications to AWS with Go. Explore options for handling errors in Go.

  23. 23
    Article
    Avatar of systemweaknessSystem Weakness·2y

    How to Install Redis Securely

    Learn how to securely install Redis on a Linux environment. The guide covers updating the system, installing Redis, ensuring local access, configuring protected mode, implementing authentication, and setting up Access Control Lists (ACLs) to define user permissions and enhance security.

  24. 24
    Article
    Avatar of hnHacker News·2y

    haampie/libtree: ldd as a tree

    A tool that turns ldd into a tree, explaining how shared libraries are found or why they cannot be located. It offers additional flags for more verbose output and requires a C compiler to be installed.

  25. 25
    Article
    Avatar of lobstersLobsters·2y

    Thoughts on Desktop Operating Systems in 2024

    The post recounts the author's experiences and thoughts on various desktop operating systems in 2024, particularly focusing on Windows, MacOS, and Linux. Windows is praised for its stability and gaming capabilities but criticized for its intrusive ads and inconsistent app quality. MacOS is lauded for its superior UI design and ecosystem integration but noted for its limited gaming options and increasing ads. Linux is appreciated for its open-source nature, strong development environment, and growing gaming support, particularly with GNOME and Valve's Proton.